Despite repeated warnings, a majority of organizations are failing to enact recommended best practice security policies around one of the primary targets of advanced attacks – privileged accounts.

According to the results of Cyber-Ark Software’s global IT security survey, 86 percent of large enterprise organizations either do not know or have grossly underestimated the magnitude of their privileged account security problem, while more than half of them share privileged passwords internally.

Privileged accounts have emerged as the primary target for advanced enterprise attacks and have been exploited to perpetrate some of the most devastating cyber-attacks and data breaches in recent memory, including those occurring at Saudi Aramco, South Korea, Global Payments, the South Carolina Department of Revenue, and the U.S. Department of Energy, among others.

According to a recent report by information security firm Mandiant, “APT intruders prefer to leverage privileged accounts where possible, such as Domain Administrators, service accounts with Domain privileges, local Administrator accounts, and privileged user accounts.”

Privileged accounts consist of privileged and administrative accounts, default and hardcoded passwords, application backdoors, and more. These accounts act as a gateway to an organization’s most sensitive data, which is accessible across systems, applications and servers. Despite the repeated abuse of privileged accounts in cyber-attacks, organizations continue to have a difficult time identifying and managing these critical vulnerabilities.

Organizations failing to accurately scope the privileged problem:

Based on the examination of more than 1200 customer deployments, Cyber-Ark determined that the number of privileged accounts in an organisation is typically three to four times the number of employees. When asked to estimate the number of privileged accounts in their organisation, 86 percent of respondents from large enterprises (5000+ employees) stated they either didn’t know how many accounts they had or that they had no more than one per employee. That means at least two out of every three privileged accounts in these organisations are either unknown or unmanaged

Privileged accounts can be found in any device with a microprocessor, including PCs, databases, networked devices like copiers, operating systems and more. When asked where privileged accounts could be found, 63 percent correctly stated ‘all of the above.’ This means that 37 percent of respondents do not understand where privileged accounts exist in their organization.

51 percent of all organisations surveyed stated that privileged and administrative account passwords were shared among “approved” users

The problem is more wide spread among large enterprises, where 56 percent of respondents stated they shared privileged passwords, as opposed to 47 percent of SMBs (5000 employees or less)

According to Gartner’s “Ten Best Practices for Managing Privileged Accounts,” the passwords for ‘shared privileged accounts’ should never be shared, stating “…sharing super-user account passwords dramatically increases the risk that a password may become known outside the intended groups. Furthermore, poorly controlled use of shared accounts cannot provide the individual accountability that is a security best practice and demanded by regulatory compliance.”

Despite 82 percent of respondents stating they have processes in place for changing privileged passwords, 49 percent of all businesses take 90 days or longer to change their privileged passwords, while 74 percent take 60 days or longer. This problem is exacerbated with large enterprises, where 53 percent take 90 days or longer to change privileged passwords

While some industry standards suggest that privileged account passwords be changed at a frequent interval of no longer than 90 days, the recent spate of attacks using privileged accounts demonstrates this time period is no longer sufficient and leaves organisations vulnerable. Privileged account password changes should be automated and restricted to one-time use to ensure tighter security standards.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.